製品・ソフトウェアに関する情報
Netatalk の papd デーモンにおける任意のコマンドを実行される脆弱性
Title Netatalk の papd デーモンにおける任意のコマンドを実行される脆弱性
Summary

Netatalk の papd デーモンには、print ファイルへの pipe コマンド内で特定の変数を使用している際、任意のコマンドを実行される脆弱性が存在します。

Possible impacts 第三者により、print リクエス内のシェルメタキャラクタを介して、任意のコマンドを実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Dec. 26, 2008, midnight
Registration Date Sept. 25, 2012, 5:17 p.m.
Last Update Sept. 25, 2012, 5:17 p.m.
CVSS2.0 : 危険
Score 9.3
Vector AV:N/AC:M/Au:N/C:C/I:C/A:C
Affected System
netatalk
netatalk 2.0.4-beta2 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年09月25日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2008-5718
Summary

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

Publication Date Dec. 27, 2008, 2:30 a.m.
Registration Date Jan. 29, 2021, 1:47 p.m.
Last Update April 2, 2009, 1 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:netatalk:netatalk:1.4.99-0.20000927:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.4.99-0.20001108:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5:rc2:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5pre3:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5pre4:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5pre5:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5pre6:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5pre7:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.5pre8:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:1.6.4a:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:* 2.0.3
Related information, measures and tools
Common Vulnerabilities List